intro to computer ch 9
Unlock all answers in this set
Unlock answersquestion
            Which type of program would likely be used by investigators to record a potential suspects' Internet activities?   Cookie  Global positioning system  Keystroke logger  Web bug
answer
        keystroke logger
question
            These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.   Spyware  Freeware  Employee-monitoring software  Cookies
answer
        Employee-monitoring software
question
            This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.   Encryption  Firewall  Password  Dictionary attack
answer
        Dictionary attack
question
            Free computer games and free screen saver programs are typical carriers of _______.   DoS  worms  viruses  Trojan horses
answer
        trojan horses
question
            This type of computer criminal creates and distributes malicious programs.   Employee  Hacker  Cracker  Keystroke logger
answer
        cracker
question
            The process of coding information to make it unreadable except to those who have a special piece of information known as a key.   Restriction  Security  Protection  Encryption
answer
        Encryption
question
            This law gives you the right to look at your personal records held by government agencies.   Gramm-Leach-Bliley Act  Freedom of Information Act  Family Educational Rights and Privacy Act  Computer Fraud and Abuse Act
answer
        Freedom of Information Act
question
            Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.   Illusion of anonymity  Browser cache  History files  Privacy mode
answer
        privacy mode
question
            This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.   Worm  Fake  Virus  Rogue
answer
        Rogue
question
            _______ is concerned with protecting software and data from unauthorized tampering or damage.   Data backup  Physical security  Disaster recovery plan  Data security
answer
        data security
question
            A program that replicates itself and clogs computers and networks.   Virus  Worm  Denial-of-service attack  Trojan horse
answer
        worm
question
            These are used by advertisers to keep track of your web activity as you move from one site to the next.   Web bugs  History files  First-party cookies  Third-party cookies
answer
        third-party cookies
question
            Which of the following is the most widely used wireless network encryption for home wireless networks?   WEP  WPE  WPA  WPA2
answer
        WPA2
question
            Small data files that are deposited on a user's hard disk when they visit a website are called _______.   cookies  codes  cache  proxies
answer
        cookies
question
            Which among the following is a way to shut down an ISP or website?   Denial of service attack  Viruses  Trojan horses  Worms
answer
        Denial of service attack
question
            A(n) _______ acts as a security buffer between a corporation's private network and all external networks.   firewall  password  disaster recovery plan  virus checker
answer
        firewall
question
            Which of the following is not malware?   Trojan horses  Viruses  Worms  Ad-Aware
answer
        Ad-Aware
question
            Corporations often use this to prevent copyright violations.   Digital Millennium Copyright Act  Website encryption  Digital rights management (DRM)  Keystroke loggers
answer
        Digital rights management (DRM)
question
            Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?   Malicious program  Internet scam  Theft  Data manipulation
answer
        internet scam
question
            Computer criminals that create and spread viruses are punished under this law.   Gramm-Leach-Bliley Act  Freedom of Information Act  Family Educational Rights and Privacy Act  Computer Fraud and Abuse Act
answer
        Computer Fraud and Abuse Act
question
            The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.   Identity theft  Auction fraud  Cyberbullying  Snoopware
answer
        cyberbullying
question
            According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away"   Digital Millennium Copyright Act  Computer Abuse Amendments Act  The Gramm-Leach-Bliley Act  Computer Fraud and Abuse Act
answer
        Digital Millennium Copyright Act
question
            Programs used to secretly record an individual's activities on the Internet are called _______.   spyware  cookies  sniffer programs  keystroke loggers
answer
        spyware
question
            This is a legal concept that gives content creators the right to control use and distribution of their work.   Piracy  Ethics  Copyright  Privacy
answer
        copyright
question
            Which of the following is not a measure to protect computer security?   Restricting access  Encrypting data  Copying data and storing it at a remote location  Keeping the same password on all systems consistently
answer
        Keeping the same password on all systems consistently
question
            The most significant concerns for implementation of computer technology involve _______, security, and ethics.   accuracy  property  privacy  access
answer
        privacy
question
            People that collect and sell personal data are called _______.   direct marketers  fund-raisers  information resellers  government agencies
answer
        information resellers